Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 118 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 118
Topic #: 1
[All 312-50v12 Questions]

Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?

  • A. Pass the hash
  • B. Internal monologue attack
  • C. LLMNR/NBT-NS poisoning
  • D. Pass the ticket
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
a307962
4 months, 2 weeks ago
Selected Answer: A
A. Pass the hash
upvoted 1 times
...
insaniunt
11 months ago
Selected Answer: A
A. Pass the hash
upvoted 1 times
...
IPconfig
1 year ago
A hash injection/PtH attack allows an attacker to inject a compromised hash into a local session and use the hash to validate network resources The attacker finds and extracts a logged-on domain admin account hash The attacker uses the extracted hash to log on to the domain controller Module 06 Page 6 CEHV12
upvoted 1 times
...
Vincent_Lu
1 year, 4 months ago
Selected Answer: A
A. Pass the hash: An attack where the attacker uses a hashed value instead of the actual password to gain unauthorized access. B. Internal monologue attack: Stealing a user's internal thoughts or dialogues from a system to obtain sensitive information. C. LLMNR/NBT-NS poisoning: Exploiting vulnerabilities in LLMNR and NBT-NS protocols to redirect hostname resolution and potentially enable man-in-the-middle attacks or eavesdropping. D. Pass the ticket: Leveraging stolen authentication tickets to impersonate identities and gain unauthorized access to systems or services.
upvoted 2 times
...
victorfs
1 year, 6 months ago
Selected Answer: A
A. Pass the hash
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: A
A. Pass the hash Like V11 Q399
upvoted 1 times
...
eli117
1 year, 7 months ago
Selected Answer: A
A. Pass the hash attack, where she can use the captured password hash to authenticate to the system without knowing the original password. This attack is commonly used when password cracking is not feasible. B is an internal monologue attack, C is LLMNR/NBT-NS poisoning, and D is Pass the ticket.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...